Vulnerabilities
Vulnerable Software
Cisco:  >> Catalyst 7600 Ws-X6380-Nam  Security Vulnerabilities
The HTTP server in Cisco IOS on Catalyst switches does not properly handle TCP socket events, which allows remote attackers to cause a denial of service (device crash) via crafted packets on TCP port (1) 80 or (2) 443, aka Bug ID CSCuc53853.
CVSS Score
5.4
EPSS Score
0.005
Published
2013-02-13
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.
CVSS Score
5.0
EPSS Score
0.007
Published
2007-09-27
The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
CVSS Score
10.0
EPSS Score
0.03
Published
2007-03-03
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
CVSS Score
7.8
EPSS Score
0.011
Published
2005-12-15
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
CVSS Score
5.0
EPSS Score
0.008
Published
2004-01-05
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
CVSS Score
5.0
EPSS Score
0.007
Published
2004-01-05


Contact Us

Shodan ® - All rights reserved